Detecting Pegasus Infections

This tool seems to do a pretty good job.

The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But the company also offers a free version of the feature for anyone who downloads the iVerify Basics app for $1. These users can walk through steps to generate and send a special diagnostic utility file to iVerify and receive analysis within hours. Free users can use the tool once a month. iVerify’s infrastructure is built to be privacy-preserving, but to run the Mobile Threat Hunting feature, users must enter an email address so the company has a way to contact them if a scan turns up spyware—as it did in the seven recent Pegasus discoveries.

Posted on December 6, 2024 at 7:09 AM10 Comments

Comments

paymetofixaproblem December 6, 2024 12:16 PM

  1. a super way to help Peggy adapt to cover its tracks better
  2. to the extent Peg can fool this tool, ppl will be misled
  3. a good way to identify surveillance conscious or surveillance evadimg people

why arent these features built into operating systems

Clive Robinson December 6, 2024 4:52 PM

@ ALL

A couple of related notes.

Firstly it’s not just NSO et al doing this spying on your Mobiles and Smart devices. This story from a couple of days back is about the Russian FSB and their toys from a different box,

https://www.theregister.com/2024/12/06/badass_russian_techie_outsmarts_fsb/

Secondly, on a preventative measure, who remembers certain people going on about the evils of “End 2 End Encryption”(E2EE) and how LEO’s had to have ways to stop it?

Yeah well most readers hear could work out the “trouser butt polishers” over at the desk chairs in the FBI DoJ and various other National and State Law Enforcement and Other Agencies were “blowing smoke”…

But these bad ideas tend to linger in the least pleasant of malodorous ways. So imagine my surprise…

Look what has “slipped in” to the latest CISA Hardening Guidence,

“Enhanced Visibility and Hardening Guidance for Communications Infrastructure”

Released on the 4th Dec at,

https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure

You will find in there,

Ensure that traffic is end-to-end encrypted to the maximum extent possible.

Yup read that twice the FBI presumably under influence of others now says E2EE is good…

ResearcherZero December 7, 2024 4:57 AM

@paymetofixaproblem

Re: why arent these features built into operating systems

The developers use machine learning to analyze the kernel for signs of spyware.

FSB spyware disguised as an app.

‘https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/

Clive Robinson December 7, 2024 12:54 PM

@ ResearcherZero,

With regards FSB it looks like we have the same security item but from different reports.

As far as I can tell, the FSB are still acting “More boots than brains” and it’s why we got to hear about just a little more that is going on toward the East of Europe.

From the news it would appear things are going on in the MidEast and the kinetic support “The English Dentist” was getting has like morning mist either evaporated or gone to ground.

Then there is the alleged use of TikTok by several thousand mist like beings or ghosts in Romania but more likely from the same place that “The English Dentist” got his support,

https://www.bbc.co.uk/news/articles/cvg6l06ldpqo

There are clear warnings being given that the Romanian people need to be mindful of this centuries history with Belarus and Ukraine and kinetic and other “supportive action” from the East.

Winter December 7, 2024 12:59 PM

@Clive

Yup read that twice the FBI presumably under influence of others now says E2EE is good…

As the TLAs cannot protect Americans that count™ against foreign interference anymore, they have to tell these Important Americans to protect themselves.

I think we should not assume this advice extends to other Americans.

Clive Robinson December 13, 2024 12:12 AM

@ Winter, ALL,

With regards,

“I think we should not assume this advice extends to other Americans.”

Or others that are not Americans, as it was in effect,

“The truth acknowledged under duress by the FBI, from their usual lies and nonsense since before the 1990’s and Crypto Wars One.”

So maybe we should thank not just the Western Agencies that eventually pushed for the truth, but also in a way the Foreign National Powers(s) that put the pressure on those agencies.

After all you and I as well as several others who read here can and did work out by simple logic that what ever silly name you gave these unwarranted access methods they would as history almost always shows

“Be abused, not just by those that can get legislated access, but also by those who should not get any access at any time.”

But we should also consider just how good or in reality bad is the advice “use E2EE”?

The problem now is that if E2EE becomes the norm as I suspect it will. Things will change and mandated weaknesses to be exploited will become actual weaknesses of poor design that get exploited.

There is as I’ve pointed out over the years the issue that,

No current consumer device is secure as a system

Mainly for two reasons,

Firstly because the security end point is before the communications end point and this makes an “end run” or “reach around” attack not just plausible but probable (and we know already in use).

Secondly E2EE always has “Key Material”(KeyMat) issues in oh so many respects.

An attacker does not need to break the encryption if they can,

1, Break the random generator.
2, Break the next key selection algorithm.
3, Gain access to the root “shared secrets” in some way.

We know the NSA/GCHQ have broken random generators if for no other reason the start up entropy in what are in effect embedded devices is at best minimal[1].

Such “E2EE” Key generation algorithms are an issue always, as they have to maintain state at both ends of the communications link, without this being in any way available or predictable to an attacker and this is actually quite a hard issue to design correctly.

The simple “20,000ft view” way mostly envisaged is to use around twice the entropy and a block cipher of sufficient security, with part or all of the entropy used to set a counter that is then pushed through what is hoped to be a “One Way Function”(OWF)… But it’s a little like a recipe for making food that says “chuck it in a bowl and serve”, it might work –probably badly– for a salad but for something baked, not a chance.

Which raises the issue that OWF’s are for various reasons “an assumption” and we know way to little currently to “get the balance” or ratios in such algorithms.

But there is also the secondary issue of even if the OWF gives the level of security required, it fails if the “shared” state or it’s starting value can be found by basic knowledge of “the system” production process and the equivalent of a short run of “brut force searching”.

Thus more sophisticated methods are needed, but the result is always that for each and every E2EE connection/communications path to be used the “state” that is the effective “Root of trust” entropy for that path needs to be stored in some way on both “Security End Point” Devices and this can quickly become a lot of vulnerable storage. Thus there needs to be the equivalent of a “Hardware Security Module”(HSM) on both end points and a secure design process for the device (that let’s face it is not going to happen). For instance we already know those manufacturers of CPU’s with supposed “security enclaves” have, lets just say found the task of making them secure more difficult than they dare admit to…

Worse though is “Users are Humans” with all the failings that entails. At the very least is the desire to “back up user data” to “keep them happy” in case the user looses or breaks their device. Which means each and every one of those “Roots of Trust” need to be “Stored Off Device”. So in effect “made available” to 3rd Party attackers via another probably easier path of attack without either the 1st or 2nd parties communicating knowing it.

It’s just one of the reasons I advocate for entirely separate devices for the “Security End Point” and the “Communications End Point”.

Life as they say is “never easy” especially with humans involved…

[1] This is something I’ve pointed out for way more than a decade here and longer else where. Back in the early 1990’s I wrote about this significant issue for an employer who had design engineers in Korea that “assumed” quite incorrectly that “silicon starts up randomly”. They only needed 20bit of entropy for producing an “Over the Air ID” on the production line, but what they found way to late, is that they were not getting even 7bits at the tails…

Clive Robinson December 22, 2024 9:49 PM

@ Bruce, Winter, ALL,

And in better news a US judge finds against NSO,

https://www.reuters.com/technology/cybersecurity/us-judge-finds-israels-nso-group-liable-hacking-whatsapp-lawsuit-2024-12-21/

“U.S. District Judge Phyllis Hamilton in Oakland, California, granted a motion by WhatsApp and found NSO liable for hacking and breach of contract.”

But not what we would really like, whilst some are saying

“We spent five years presenting our case because we firmly believe that spyware companies could not hide behind immunity or avoid accountability for their unlawful actions”

The reality is,

“The case will now proceed to a trial only on the issue of damages, [Judge] Hamilton said.”

So a partial and useful win, but not something that would put NSO on the same sort of legal punishment footing as the equivalently behaving Russian, Chinese and Iranian organisations.

People complain of “two tier justice” well I suspect history will reflect that with regards NSO in effect “getting a pass” from the various US Federal Agencies and other Western National equivalents.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.